To compute a hash, you have to consider the entire file. However, there are some non-security related use cases where you want to trade off accuracy for speed.
This is where sha256p50 comes in (p50 means probability 50%). It splits the file into blocks and considers only every second block.
You get doubling of speed at the expense of certainty.
There will be other variations such as sha256p10 with 10x speedup and sha256p1with 100x speedup. Of course sha256p100 = sha256
Important thing here is that this should not be relied for in cyber security because malicious actor could just plant their malicious code within the non-scanned gaps. This is not to say that it's useless for cyber security. You can still use it as long as you understand the trade off.
t+1s sha256p1: ok
1+10s sha256p10: FAIL
t+10s sha256p100: FAIL (induced)
The user knew that the hash didn't match within 10 seconds instead of having to wait 100s. So you can detect failures right away, but you HAVE TO wait for confirmation the full 100s. You can't get into the habit of ctrl+c ing it.
It's one of those tools that would have to have a big warning on it (USE ONLY IF YOU KNOW WHAT YOU ARE DOING) .. but this being half bakery I believe I get buns for that kind of thing